Mary, a penetration tester, has found password hashes in a client system she managed to breach. She needs to use these passwords to continue with the test, but she does not have time to find the passwords that correspond to these hashes.
Which type of attack can she implement in order to continue?
a307962
8 months, 4 weeks agoinsaniunt
1 year, 3 months agoIPconfig
1 year, 5 months agoVincent_Lu
1 year, 9 months agovictorfs
1 year, 10 months agojeremy13
1 year, 11 months agoeli117
1 year, 12 months ago